Free Realistic CompTIA A+ Practice Test Questions With Answers & Explanations (Core 1 and Core 2 Exams)

To earn the CompTIA A+ certification, you must pass two exams:
- 220-1201 (Core 1) – Version 15
- 220-1202 (Core 2) – Version 15
TechCertGuide offers carefully designed, scenario-based CompTIA A+ practice test questions that reflect the real exam experience. Each question includes detailed answers and clear explanations to help you understand the reasoning behind every solution.
You can access these practice questions for free below.
If you prefer to study by exam objective, TechCertGuide also provides separate sets of free practice questions for Core 1 and Core 2, allowing you to focus on specific topics and strengthen your weak areas.
Get 200+ CompTIA A+ Practice Questions in PDF
Table of Contents
Objectives Covered in CompTIA A+ Practice Test Questions
Objectives of 220-1201 Core 1 Exam V15
- Mobile devices (13%)
- Networking (23%)
- Hardware (25%)
- Virtualization and cloud computing (11%)
- Hardware and network troubleshooting (28%)
Objectives of 220-1202 Core 2 Exam V15
- Operating systems (28%)
- Security (28%)
- Software troubleshooting (23%)
- Operational procedures (21%)
CompTIA A+ Core 1 Practice Test Questions
Question
A technician is replacing the battery in a modern smartphone that uses an adhesive strip for battery retention. After removing the old battery, the technician notices slight residue on the battery compartment and plans to install the new battery. The customer also requests that the device be ready for wireless charging after replacement. What should the technician do to ensure safe installation and maintain wireless charging functionality?
A. Clean the residue with isopropyl alcohol and install the new battery without additional adhesive
B. Remove all adhesive residue and apply manufacturer-approved adhesive before installing the battery
C. Install the battery without cleaning the compartment and test wireless charging
D. Use third-party adhesive strips and skip cleaning to avoid damaging internal components
Correct Answer: B
Explanation:
Cleaning the battery compartment removes residue that can prevent proper seating of the battery and reduce heat dissipation. Using manufacturer-approved adhesive ensures the battery remains securely positioned and does not shift during device use. Proper installation is also essential for wireless charging systems, which rely on precise alignment between internal charging coils and the device’s components.
Skipping cleaning or using non-approved adhesives could interfere with heat management and charging efficiency. Following vendor recommendations ensures device safety and optimal performance after replacement. Wireless charging functionality depends on proper component alignment and installation practices that meet manufacturer standards.
Question
A field technician is setting up a tablet for a corporate employee who requires both Wi-Fi and Bluetooth connectivity for work. The employee reports intermittent Bluetooth drops when using a wireless keyboard while connected to the company’s Wi-Fi network. The environment contains multiple wireless devices and access points. What troubleshooting step should the technician prioritize?
A. Change the Wi-Fi channel on the access point to reduce interference
B. Replace the Bluetooth keyboard battery and test connectivity
C. Disable Wi-Fi and use only Bluetooth for peripheral connections
D. Reset the tablet to factory settings before reconnecting devices
Correct Answer: A
Explanation:
Bluetooth and Wi-Fi operate in similar frequency ranges, and interference from congested wireless channels can disrupt Bluetooth connections. Changing the Wi-Fi channel reduces overlap and improves wireless stability without affecting device configurations.
This is a common troubleshooting step in environments with multiple access points and wireless devices. Replacing the keyboard battery or resetting the tablet may not address the root cause of interference. Proper channel selection optimizes wireless performance and prevents connectivity issues for both Wi-Fi and Bluetooth.
Question
A user reports that their mobile device cannot connect to the corporate VPN after switching to a new Wi-Fi network at home. The device successfully accesses the internet, but VPN authentication fails. The network uses a consumer-grade router with default security settings. What is the most likely cause of the VPN issue?
A. The router is blocking VPN traffic through its firewall settings
B. The mobile device requires a software update before VPN access
C. The Wi-Fi network is not providing sufficient bandwidth
D. The device’s Bluetooth settings are interfering with network connectivity
Correct Answer: A
Explanation:
Consumer routers often block VPN traffic by default or require specific port configurations to allow secure connections. Even if internet access works, VPN protocols may be restricted by firewall settings. Updating the device or adjusting Bluetooth settings will not resolve a network-level restriction.
Ensuring that the router permits VPN traffic or configuring port forwarding resolves authentication and connectivity issues. Understanding network security configurations is essential for troubleshooting remote access problems.
Question
A technician is configuring a new firewall for a small accounting firm. The firm uses a cloud-based email service that requires secure message retrieval and secure message submission from internal workstations. The technician wants to allow only the necessary outbound traffic for retrieving email from the server and sending email securely, while blocking all other unnecessary mail-related ports.
Which two ports should the technician explicitly allow through the firewall to meet the requirement?
A. TCP 110 and TCP 25
B. TCP 143 and TCP 587
C. TCP 993 and TCP 587
D. TCP 995 and TCP 23
Correct Answer: C
Explanation:
TCP 993 is used for IMAPS, which allows secure retrieval of email messages over SSL/TLS. This ensures that user credentials and email content are encrypted when employees check their mail from internal systems. In a business handling financial data, encryption is mandatory to prevent interception of sensitive communications.
TCP 587 is the standard port for secure SMTP message submission from clients to mail servers. It supports authentication and encryption, making it appropriate for users sending outbound email. Allowing only these two ports ensures encrypted communication for both sending and receiving email, while minimizing firewall exposure to unnecessary or insecure protocols.
Question
A company is deploying a VoIP solution across multiple branch offices. During testing, users report that calls connect successfully, but voice audio is either delayed or completely missing in one direction. The firewall team confirms that signaling traffic is allowed on TCP 5060.
Which additional protocol and port should the technician verify is allowed through the firewall to resolve the voice transmission issue?
A. UDP 5060
B. UDP 69
C. UDP dynamic high ports used by RTP
D. TCP 1720
Correct Answer: C
Explanation:
VoIP call signaling typically uses SIP on port 5060, but actual voice data is carried using RTP over UDP on dynamically assigned high-numbered ports. If only TCP 5060 is allowed, calls may establish correctly because signaling succeeds, but audio will fail because the RTP streams are blocked.
RTP uses UDP and typically operates within a configurable range of high ports. These ports must be allowed bidirectionally for voice data to flow properly. Without permitting RTP traffic, users experience one-way audio or complete silence even though the call appears connected.
Question
An organization hosts a public-facing website that recently migrated from HTTP to HTTPS. After the migration, users report that the website is no longer accessible externally, even though it works internally. The web server team confirms that the application is listening on the correct port.
Which port must the network administrator verify is open on the perimeter firewall to restore secure external access?
A. TCP 21
B. TCP 443
C. TCP 80
D. TCP 3389
Correct Answer: B
Explanation:
HTTPS traffic uses TCP port 443. When a website migrates from HTTP to HTTPS, the service shifts from TCP 80 to TCP 443. If the firewall is still configured to allow only port 80, external users will not be able to access the encrypted site.
Opening TCP 443 allows encrypted web traffic using SSL/TLS. Since the internal users can access the site, the web service itself is functioning. The issue lies at the network boundary, where the firewall must permit inbound connections on port 443 to allow secure public access.
Question
A small office network uses a VPN to allow remote employees to access internal resources. Users report that the VPN connects but they cannot access file shares or internal web applications. The VPN tunnel appears active and IP addresses are assigned correctly. As a technician, you suspect a routing issue within the SOHO network configuration. Which action would most likely resolve this problem while maintaining secure connectivity?
A. Enable split tunneling on the VPN client to allow local and remote traffic separation
B. Disable the firewall on the VPN server to permit unrestricted traffic flow
C. Assign static IP addresses to all remote clients for better routing stability
D. Change the VPN protocol from L2TP to PPTP for improved compatibility
Correct Answer: A
Explanation:
Split tunneling allows VPN clients to access both internal network resources and external internet traffic without routing all traffic through the VPN tunnel. This can resolve connectivity issues when internal resources are unreachable due to misconfigured routing policies.
In SOHO environments, enabling split tunneling helps maintain performance and proper resource access while preserving security by controlling which traffic uses the VPN tunnel. Proper configuration ensures remote users can reach internal services without overloading the VPN gateway or causing routing conflicts.
Question
A technician is troubleshooting a SOHO wireless network where users experience intermittent connectivity and slow performance during peak hours. The Wi-Fi analyzer shows multiple overlapping channels from neighboring networks. The access point supports both 2.4 GHz and 5 GHz bands. What is the best solution to reduce interference and improve performance?
A. Switch all devices to the 2.4 GHz band for better range
B. Configure the access point to use a less congested 5 GHz channel
C. Increase the transmit power of the 2.4 GHz radio
D. Disable WPA2 encryption to reduce processing overhead
Correct Answer: B
Explanation:
The 5 GHz band offers more channels and less interference compared to the crowded 2.4 GHz band, making it ideal for environments with overlapping networks. Configuring the access point to use a less congested 5 GHz channel reduces interference and improves throughput.
In SOHO networks, proper channel selection is critical for maintaining stable wireless performance, especially when neighboring networks cause channel overlap. Wi-Fi analyzers help identify optimal channels for minimizing interference and ensuring reliable connectivity.
Question
A user reports that they cannot access websites but can still ping external IP addresses from their workstation. DNS resolution appears to fail when resolving domain names. The workstation is configured to use the ISP’s DNS server. Which troubleshooting step is most likely to resolve the issue?
A. Flush the DNS cache and renew the IP lease
B. Change the DNS server to a public DNS service
C. Disable IPv6 on the network adapter
D. Restart the wireless access point
Correct Answer: A
Explanation:
Flushing the DNS cache removes outdated or corrupted entries that may prevent proper name resolution. Renewing the IP lease ensures the workstation obtains updated network configuration settings. In networking environments, DNS resolution failures often result from cached records or misconfigured DNS settings. Clearing the cache forces the system to query the DNS server again, which can resolve name resolution issues without altering network infrastructure or DNS provider settings.
Question
A technician is configuring a small office network with multiple devices requiring internet access. The ISP provides a single public IP address. To allow all devices to share the connection while maintaining security, which networking feature should be configured on the router?
A. Network Address Translation (NAT)
B. Port Address Translation (PAT)
C. Dynamic Host Configuration Protocol (DHCP)
D. Virtual LAN (VLAN) segmentation
Correct Answer: B
Explanation:
PAT, a form of NAT, allows multiple devices on a private network to share a single public IP address by mapping internal IP addresses to different ports. This enables internet connectivity while conserving public IP addresses and maintaining security. In SOHO networks, PAT is commonly used to provide internet access to multiple devices without requiring additional public IP addresses. It also helps hide internal network structures from external entities.
Question
A small accounting firm wants to test a new tax preparation application without affecting employees’ production computers. The IT technician installs a type 2 hypervisor on an existing Windows workstation and creates a virtual machine for testing. During testing, the VM crashes multiple times under heavy CPU load, but the host operating system remains stable. Management wants better performance and more efficient resource utilization without purchasing separate physical test hardware.
Which solution should the technician implement to meet this requirement?
A. Install a bare-metal hypervisor directly on the hardware and migrate the VM to it
B. Increase the virtual disk size inside the existing VM
C. Convert the VM into a container-based deployment
D. Enable desktop virtualization using remote desktop services
Correct Answer: A
Explanation:
A bare-metal hypervisor, also known as a type 1 hypervisor, runs directly on physical hardware instead of on top of a host operating system. This design eliminates the extra resource overhead introduced by a type 2 hypervisor, which depends on a full operating system to function. By installing the hypervisor directly on the hardware, system resources such as CPU and RAM are allocated more efficiently to virtual machines.
In exam scenarios, when performance and resource optimization are required without adding physical systems, moving from a hosted hypervisor to a bare-metal solution is the correct architectural decision. It ensures better stability under load and is commonly used in production environments for improved virtualization performance.
Question
A training center uses desktop virtualization so that students can access lab environments from thin clients. Recently, several students reported that when they log off and log back in from another workstation, their customized settings and installed lab tools are missing. The instructor confirms that each session starts fresh every time.
What should the IT administrator implement to ensure user settings persist across sessions?
A. Deploy non-persistent virtual desktops
B. Implement persistent virtual desktops
C. Increase RAM allocation on the hypervisor
D. Convert the environment to SaaS
Correct Answer: B
Explanation:
Persistent virtual desktops retain user configurations, installed applications, and data between sessions. In this scenario, students are experiencing fresh environments each time they log in, which indicates a non-persistent setup where changes are discarded after logout. Implementing persistent virtual desktops ensures that user profiles and customizations are saved and available during subsequent logins.
For exam purposes, understanding the difference between persistent and non-persistent desktop virtualization is critical. Persistent desktops are suitable when users require personalized environments, while non-persistent desktops are better for standardized lab or kiosk setups. Since the requirement is to maintain user settings across sessions, persistent virtual desktops are the correct solution.
Question
A startup company wants to host its own custom web application but does not want to maintain physical servers. The developers require control over the operating system, installed software, and networking configurations. However, they do not want to manage the underlying data center infrastructure.
Which cloud model best meets these requirements?
A. SaaS
B. IaaS
C. PaaS
D. Desktop as a Service (DaaS)
Correct Answer: B
Explanation:
Infrastructure as a Service provides virtualized computing resources over the internet, including virtual machines, storage, and networking. With IaaS, the organization controls the operating system, middleware, and applications while the cloud provider manages the physical hardware and infrastructure.
In exam scenarios, when a company wants maximum control over the OS and configuration but does not want to manage physical hardware, IaaS is the correct choice. SaaS removes too much control, and PaaS abstracts away OS management. The scenario clearly demands OS-level control, which aligns with IaaS responsibilities.
Question
A company subscribes to a cloud-based email and collaboration platform. Employees access it through a web browser, and the vendor handles all updates, security patches, and infrastructure maintenance. The company has no control over the underlying servers or operating systems.
Which cloud service model is being used?
A. IaaS
B. PaaS
C. SaaS
D. Private cloud
Correct Answer: C
Explanation:
Software as a Service delivers complete applications over the internet. The provider manages infrastructure, operating systems, application updates, and security patches. Users simply access the service through a browser or client interface.
For exam scenarios, when a company consumes a fully managed application without controlling the OS or hardware, it indicates SaaS. This model is common for email platforms, CRM systems, and productivity suites. Since the organization does not manage any backend components, SaaS is clearly the correct model.
Question
A user reports that their desktop PC randomly shuts down during graphic-intensive tasks such as video rendering and gaming. The system does not display a blue screen; it simply powers off completely. When powered back on, it runs normally until placed under heavy load again. The power supply was recently replaced with a higher wattage unit.
As a technician, you open the case and notice excessive dust accumulation around internal components. Which action should you take first to properly diagnose and resolve the issue?
A. Replace the motherboard due to suspected voltage regulation failure
B. Clean the internal components and verify proper airflow and cooling
C. Reinstall the operating system to eliminate software instability
D. Upgrade the GPU drivers to the latest version
Correct Answer: B
Explanation:
Sudden power-offs during high-load operations commonly indicate overheating. When a system overheats, modern motherboards trigger an automatic shutdown to prevent hardware damage. The fact that the shutdown occurs only during graphic-intensive workloads further supports a thermal issue rather than a software or motherboard failure.
Dust accumulation restricts airflow, blocks heatsinks, and prevents fans from operating efficiently. Cleaning internal components, checking fan functionality, and confirming proper airflow is the correct first troubleshooting step. This approach follows best practice methodology: start with the most likely and least invasive solution before replacing hardware. Ensuring proper cooling can restore system stability without unnecessary component replacement.
Question
A technician is troubleshooting a laptop that connects to a corporate Wi-Fi network but cannot access internal file servers. The user can browse the internet without issues. Other employees can access both the internet and file servers using the same wireless network.
You run ipconfig and notice the laptop has a valid IP address, subnet mask, and default gateway. However, it does not list a DNS suffix for the corporate domain. What is the most likely cause?
A. The wireless router firmware is outdated
B. The laptop is connected to the guest VLAN
C. The file server is powered off
D. The wireless adapter driver is corrupt
Correct Answer: B
Explanation:
If the laptop can access the internet but cannot reach internal corporate resources, it suggests network segmentation. Many organizations configure separate VLANs for guest and internal access. Guest VLANs typically allow internet connectivity but block access to internal file servers and domain resources.
The absence of a corporate DNS suffix further confirms the system is not receiving internal domain configuration from DHCP. This indicates the device is on a restricted network segment rather than experiencing a hardware or driver issue. Connecting the laptop to the correct internal SSID or VLAN will restore access to corporate file servers.
Question
A user complains that their workstation intermittently loses network connectivity. The link light on the NIC turns off briefly and then turns back on. The issue occurs several times per day. Replacing the Ethernet cable temporarily resolved the issue, but the problem returned the next day.
You notice the workstation is connected to a wall jack near a heavily used hallway. What is the most likely root cause?
A. Faulty switch port
B. DHCP lease expiration
C. Physical damage to the wall jack wiring
D. Incorrect DNS server configuration
Correct Answer: C
Explanation:
Intermittent link light loss indicates a physical layer issue. Since replacing the patch cable provided only temporary relief, the issue likely exists beyond the cable itself. The location of the wall jack near a high-traffic area suggests possible damage or loosened wiring inside the wall termination.
Physical wear from repeated impact or movement can cause intermittent disconnections at the punch-down block or keystone jack. This matches the symptoms of momentary signal loss. Inspecting and re-terminating or replacing the wall jack wiring is the correct next troubleshooting step to permanently resolve the connectivity issue.
Question
A user reports that their PC powers on, fans spin, but nothing appears on the monitor. There are three short beeps during startup. The monitor works with another computer. The graphics card was recently upgraded.
What should you investigate first?
A. Replace the power supply
B. Reseat or test the RAM modules
C. Update the BIOS firmware
D. Replace the monitor cable
Correct Answer: B
Explanation:
POST beep codes are used to indicate hardware failures before video initialization. Three short beeps commonly indicate a memory-related issue. Even though the graphics card was recently upgraded, the system is not completing POST, meaning the problem occurs before the display output stage.
Reseating RAM modules or testing them individually is the most logical first step. During hardware upgrades, components may be inadvertently loosened. Memory issues frequently cause systems to power on with fans spinning but display no video. Correcting improperly seated or faulty RAM often resolves the issue without unnecessary part replacement.
Get 200+ CompTIA A+ Exam Questions in PDF
CompTIA A+ Core 2 Practice Test Questions
Question
A small business is replacing several aging desktops with new systems that support UEFI firmware and NVMe drives. The company requires Windows 11 installation with Secure Boot enabled and disk-level protection using BitLocker. During testing, a technician installs Windows but notices Secure Boot cannot be enabled afterward because of the current disk configuration.
The technician confirms the system is running in UEFI mode, but the disk was partitioned using an older format during installation. To meet company security requirements without reinstalling multiple times, what should the technician have done during the installation process?
A. Partition the drive using MBR to ensure compatibility with BitLocker
B. Convert the disk to GPT and install Windows in UEFI mode
C. Disable TPM in firmware settings before installing Windows
D. Install Windows in Legacy BIOS mode and enable Secure Boot later
Correct Answer: B
Explanation:
Windows 11 requires UEFI firmware with Secure Boot enabled and a GPT-partitioned disk. When a disk is formatted using MBR, Secure Boot cannot be properly supported because MBR is associated with Legacy BIOS configurations. In a modern deployment using NVMe drives and UEFI firmware, GPT must be used during installation to fully support Secure Boot and advanced security features.
BitLocker also integrates with TPM and Secure Boot to protect the integrity of the boot process. Installing Windows in UEFI mode but keeping the disk in MBR creates a mismatch that prevents Secure Boot from being enabled correctly. The correct approach during OS installation is to ensure the disk is partitioned as GPT before or during setup so that all security requirements function properly without reinstallation.
Question
An organization is deploying macOS on several new MacBook systems for graphic designers. The devices must be configured with a clean installation because they were previously assigned to another department and contain legacy applications. During reinstallation, the technician needs to ensure the latest compatible version of macOS is installed directly from Apple’s servers.
Which method should the technician use to perform this installation properly?
A. Boot into Safe Mode and erase the disk using Disk Utility
B. Use Internet Recovery by holding Option + Command + R at startup
C. Create a Windows bootable USB and reformat the drive
D. Use Migration Assistant before reinstalling the operating system
Correct Answer: B
Explanation:
Internet Recovery allows a Mac to download and install the latest compatible version of macOS directly from Apple’s servers. By holding Option + Command + R during startup, the system enters Internet Recovery mode, which is specifically designed for clean installations or recovery when the local recovery partition is unavailable or outdated.
This method ensures that the most recent supported macOS version is installed, which is important when redeploying devices across departments. It also allows the technician to erase the internal disk using Disk Utility before proceeding with installation, guaranteeing that no previous user data or legacy applications remain on the system. This process aligns with enterprise-level reimaging practices.
Question
A Linux administrator is installing Ubuntu Server on a system that will host internal web applications. The organization requires separate partitions for /home, /var, and swap to improve manageability and prevent log files from consuming all disk space. During installation, the technician must manually configure storage to meet these requirements.
Which installation option should the administrator select to properly configure the disk layout?
A. Use automatic partitioning with guided LVM setup
B. Choose manual partitioning and define custom mount points
C. Install using the minimal installation option
D. Use the default partitioning scheme without modification
Correct Answer: B
Explanation:
Manual partitioning allows the administrator to explicitly define separate mount points such as /home, /var, and swap. This is critical in server environments where log files stored in /var can grow rapidly and potentially fill the entire disk if not isolateD. By creating dedicated partitions, the administrator ensures better control over disk utilization and system stability.
Automatic or guided partitioning does not always create the specific layout required by organizational policy. In production environments, separating user data, logs, and system files reduces risk and simplifies backup and maintenance processes. Manual configuration during installation ensures compliance with storage planning and operational standards expected in enterprise Linux deployments.
Question
A company allows employees to connect to the corporate network using their personal laptops via Wi-Fi. Recently, an attacker set up a rogue access point mimicking the company’s SSID, capturing login credentials from unsuspecting users. The IT team wants to prevent devices from connecting to unauthorized wireless networks and enforce encryption for all network communications. Which security measures should be implemented to mitigate this risk in the most effective manner?
A. Deploy wireless access points with WPA3-Enterprise and implement certificate-based authentication for clients
B. Disable Wi-Fi on all employee devices and require Ethernet connections for network access
C. Use MAC address filtering on the wireless network and rely on WPA2-Personal encryption
D. Implement a captive portal that requires users to reauthenticate every 30 minutes
Correct Answer: A
Explanation:
Implementing WPA3-Enterprise with certificate-based authentication ensures strong encryption and verifies device identity before granting network access. This prevents rogue access points from intercepting credentials and enforces secure wireless communications.
Certificate-based authentication adds an extra layer of security by eliminating reliance on shared passwords, which can be compromised. Using enterprise-grade encryption and identity verification aligns with best practices for protecting sensitive corporate networks in wireless environments.
Question
A remote workforce accesses company resources using a virtual private network (VPN). Employees report intermittent connectivity issues, and some devices appear to be using outdated encryption protocols. The security policy requires that only modern encryption standards be used for data transmission. What configuration change should the IT administrator implement?
A. Force the VPN to use AES-256 encryption and disable support for legacy protocols
B. Allow split tunneling to reduce VPN traffic and improve connection stability
C. Use PPTP as the VPN protocol for better compatibility with older devices
D. Disable the VPN and require employees to access resources through a web portal
Correct Answer: A
Explanation:
Forcing the VPN to use AES-256 encryption and disabling legacy protocols ensures secure data transmission and compliance with modern security standards. Outdated encryption methods are vulnerable to exploitation and should not be used in enterprise environments. AES-256 provides strong cryptographic protection, reducing the risk of data interception. Maintaining robust encryption aligns with security best practices while still allowing remote access through a protected channel.
Question
A small business stores customer data on a shared network drive. Multiple employees report unauthorized modifications to files, and there is no clear record of who accessed or changed the data. The company needs to implement access controls and track user activity. Which solution best addresses these requirements?
A. Enable file system permissions and audit logging on the shared drive
B. Store all files in a compressed archive to prevent unauthorized edits
C. Use password-protected documents for sensitive customer information
D. Grant all employees read-write access to simplify collaboration
Correct Answer: A
Explanation:
Enabling file system permissions restricts access based on user roles, preventing unauthorized modifications. Audit logging tracks activity, providing visibility into who accessed or altered files. This combination of access control and monitoring helps maintain data integrity and accountability. Security measures that enforce permissions and logging are essential for protecting sensitive information in shared environments.
Question
A company uses biometric authentication for employee workstation access. An employee’s fingerprint scanner occasionally fails to recognize their fingerprint, forcing them to use a backup authentication methoD. The security team wants to balance usability with security. Which approach best addresses this requirement?
A. Implement multi-factor authentication with biometrics and a secondary token
B. Disable biometric authentication and rely solely on passwords
C. Reduce fingerprint sensitivity to improve recognition accuracy
D. Allow unrestricted workstation access to eliminate authentication issues
Correct Answer: A
Explanation:
Multi-factor authentication combines biometrics with a secondary token, providing both security and usability. If the fingerprint scanner fails, the secondary method ensures access without compromising security. This approach reduces reliance on a single authentication factor while maintaining strong identity verification. Balancing authentication methods is a recommended security practice for protecting workstations and sensitive data.
Question
Employees frequently connect to public Wi-Fi while working remotely. The IT department is concerned about data interception and wants to ensure encrypted communication between devices and corporate resources. Which security measure should be prioritized?
A. Require VPN usage for all remote connections
B. Block access to public Wi-Fi networks on employee devices
C. Use unsecured HTTP for faster data transmission
D. Disable remote access and require in-office work only
Correct Answer: A
Explanation:
Requiring a VPN for remote connections encrypts data transmitted over public networks, protecting it from interception. Public Wi-Fi is inherently insecure, and VPN encryption ensures confidentiality and integrity of communications. This security measure allows remote work while mitigating risks associated with untrusted networks. Encrypting network traffic is a fundamental requirement for secure remote access.
Question
A company’s wireless network uses WPA2-Personal with a shared passworD. Employees often share the password with contractors, increasing the risk of unauthorized access. The security team wants to improve authentication without disrupting operations. What is the most effective solution?
A. Upgrade to WPA3-Enterprise with individual user credentials
B. Periodically change the shared password to limit exposure
C. Use MAC address filtering to restrict device access
D. Disable wireless access and require wired connections
Correct Answer: A
Explanation:
WPA3-Enterprise provides individual user authentication, eliminating reliance on shared passwords and reducing the risk of unauthorized access. Each user must authenticate with unique credentials, improving security and accountability. This approach prevents password sharing and strengthens wireless network protection. Enterprise authentication is the preferred method for securing corporate wireless environments.
Question
A laptop containing sensitive company data is stolen. The hard drive was encrypted, but the user left the device logged in at the time of theft. The security team wants to prevent data exposure in similar incidents. Which additional security measure should be implemented?
A. Require automatic screen locking after inactivity
B. Store all data exclusively in cloud storage
C. Disable encryption to improve system performance
D. Allow users to remain logged in for convenience
Correct Answer: A
Explanation:
Automatic screen locking after inactivity prevents unauthorized access if a device is left unattended. Even with encryption, a logged-in session could expose sensitive data to an attacker. Locking the screen ensures that authentication is required to regain access. This measure complements encryption by protecting active sessions and reducing the risk of data exposure.
Question
A company uses role-based access control (RBAC) to restrict employee access to sensitive systems. An employee recently changed departments but still retains access to resources from their previous role. The security team needs to enforce proper access restrictions. What action should be taken?
A. Update user permissions to match the employee’s current role
B. Grant universal access to simplify system management
C. Use shared accounts to reduce administrative overhead
D. Allow employees to self-manage their access settings
Correct Answer: A
Explanation:
Updating user permissions to reflect the employee’s current role ensures they only access resources necessary for their job. RBAC principles require periodic permission reviews to prevent privilege accumulation. Removing outdated access reduces security risks and enforces least privilege. Proper access management is essential for maintaining secure and compliant systems.
Question
A user reports that their Windows workstation fails to boot and repeatedly displays a “Preparing Automatic Repair” message before restarting. The issue began after a power outage, and Safe Mode also loops back to the same screen. The user needs access to business documents stored locally but cannot reach the desktop. What is the most appropriate troubleshooting step that minimizes data loss while addressing the boot issue?
A. Perform a clean installation of Windows without preserving user data
B. Use System Restore from the recovery environment to revert to a previous restore point
C. Replace the hard drive and reinstall the operating system
D. Disable Automatic Repair in the BIOS settings
Correct Answer: B
Explanation:
The recovery environment provides access to System Restore, which can revert system files and settings to a prior state without affecting user datA. This approach addresses potential system corruption caused by the outage while minimizing the risk of data loss. It is a standard troubleshooting step for boot issues that loop into repair mode. Using restore points helps resolve configuration or update-related problems without requiring a full reinstallation.
Question
A laptop user reports that applications frequently freeze and become unresponsive after a recent operating system update. Event logs show repeated application crashes, but hardware diagnostics report no failures. The user needs the system stable for daily work with productivity software. What is the best troubleshooting action?
A. Roll back the operating system update to the previous version
B. Replace the laptop’s RAM modules
C. Disable all startup applications permanently
D. Reformat the hard drive and reinstall applications
Correct Answer: A
Explanation:
Rolling back the recent update addresses potential compatibility issues introduced by the new version. Since hardware diagnostics are clean and crashes began after the update, reverting to the previous OS state is a logical step. This minimizes disruption while preserving user data. If stability returns after rollback, further investigation into update compatibility can be performed.
Question
A workstation user reports that their installed productivity application opens but immediately crashes without error messages. Reinstalling the application does not resolve the issue. Other applications function normally, and the operating system is up to date. What is the most likely troubleshooting step?
A. Clear the application’s configuration or cache files
B. Replace the motherboard
C. Upgrade the operating system edition
D. Disable antivirus software permanently
Correct Answer: A
Explanation of this CompTIA A+ Practice Test Question:
Corrupted configuration or cache files can cause application instability even after reinstallation. Removing or resetting these files forces the application to rebuild them, often resolving crashes. Since other applications work and the OS is stable, hardware replacement is unnecessary. This step targets the application-specific issue without affecting system integrity.
Question
A user reports that after logging into Windows, the desktop loads slowly and icons appear gradually. Task Manager shows high CPU usage by a process related to a third-party application. The user recently installed the application. What should the technician do first?
A. Uninstall the recently installed third-party application
B. Perform a factory reset of the operating system
C. Replace the processor
D. Disable Windows Update services
Correct Answer: A
Explanation:
Since high CPU usage correlates with a recently installed application, uninstalling it is the first logical step. This isolates the cause of performance degradation without altering core system components. If performance improves, the application may be incompatible or misconfigured. Further troubleshooting can follow if the issue persists.
Question
A remote user reports that their VPN connection establishes but immediately drops after authentication. The operating system logs show certificate validation errors. Other network connections work normally. What is the best troubleshooting action?
A. Update or reinstall the VPN client certificates
B. Replace the network adapter
C. Disable the firewall permanently
D. Reset the router configuration
Correct Answer: A
Explanation:
Certificate validation errors indicate that the credentials or certificates used by the VPN are outdated or corrupteD. Updating or reinstalling certificates resolves authentication issues without altering network hardware. Since other network connections function, the problem is specific to VPN authentication. Addressing certificates restores secure connectivity.
Question
A workstation user reports that after a recent update, the screen resolution is limited and display settings show “Generic PnP Monitor.” The user cannot select higher resolutions previously available. What is the most appropriate troubleshooting step?
A. Update or reinstall the display driver
B. Replace the monitor
C. Disable Windows Display Scaling
D. Perform a system restore to an older point
Correct Answer: A
Explanation:
The “Generic PnP Monitor” message typically indicates a missing or outdated display driver. Updating or reinstalling the driver restores full functionality and resolution options. Since hardware is functioning, driver issues are the most probable cause. This solution addresses the problem without requiring system restoration.
Question
A user reports that their mobile device frequently loses Wi-Fi connectivity when moving between rooms in an office building. The connection drops even though the Wi-Fi network shows full signal strength in some areas and reconnects after a few minutes. The user also mentions that other devices in the same area do not experience similar issues. You verify that the device’s operating system and network settings are up to date. What is the most likely cause and troubleshooting step?
A. The device is using an outdated Wi-Fi standard and must be replaced
B. The access points may not support seamless roaming; verify AP configuration and firmware
C. The user’s mobile data is interfering with Wi-Fi and must be disabled
D. The network requires a static IP configuration to maintain connectivity
Correct Answer: B
Explanation:
Seamless roaming between access points depends on proper configuration and firmware of wireless infrastructure. If access points are misconfigured or running outdated firmware, devices may drop connections when transitioning between coverage areas even with strong signal strength. Since other devices function normally, the issue is likely related to how roaming is handled by the access points rather than the mobile device itself.
Verifying AP settings and updating firmware can improve handoff behavior and connectivity stability. This aligns with mobile troubleshooting practices that focus on network infrastructure when symptoms occur only in specific locations.
Question
A remote employee reports that a productivity application on their smartphone crashes immediately after launching. The issue started after a recent app update. Reinstalling the app does not resolve the problem, and other applications function normally. The device has sufficient storage and the operating system is current. What is the most appropriate troubleshooting step?
A. Clear the application cache and data before launching the app again
B. Downgrade the application to the previous version using an APK file
C. Reset the device to factory settings to eliminate software corruption
D. Replace the mobile device because the application is incompatible
Correct Answer: A
Explanation:
Application crashes after updates are often caused by corrupted cache or stored data that conflicts with the new version. Clearing the cache and application data forces the app to rebuild its configuration and temporary files, resolving many post-update issues without requiring drastic measures.
Factory resets or device replacement are unnecessary when the problem is isolated to one application. This troubleshooting approach aligns with mobile support practices by addressing software-level issues before considering more disruptive solutions.
Question
A user reports that their smartphone battery drains rapidly even when the device is idle. They recently installed several new applications and enabled background synchronization for cloud services. The device does not overheat and performance remains normal. What is the most effective troubleshooting action?
A. Disable background app refresh and review battery usage statistics
B. Replace the battery because rapid drain indicates hardware failure
C. Reduce screen brightness and enable airplane mode permanently
D. Uninstall the operating system and reinstall it to fix power management
Correct Answer: A
Explanation:
Background processes and synchronization can consume significant power even when the device appears idle. Reviewing battery usage statistics identifies which applications or services are using excessive resources. Disabling background refresh for nonessential apps reduces power consumption and improves battery life.
Since the device does not overheat and performance is normal, hardware failure is unlikely. This approach follows mobile troubleshooting principles by targeting software and configuration settings before considering hardware solutions.
Question
A mobile user cannot send or receive text messages but can still make voice calls and use mobile data. The issue occurs in multiple locations and persists after restarting the device. Network settings appear correct. What is the most likely cause and solution?
A. The messaging service on the carrier account is disabled; contact the carrier
B. The device requires a firmware update to support messaging features
C. The SIM card must be replaced because it only affects data services
D. Airplane mode is enabled and must be turned off to restore messaging
Correct Answer: A
Explanation:
If voice and data services function but messaging does not, the issue is often related to carrier provisioning or account settings rather than the device itself. Messaging services may be disabled or misconfigured on the carrier side, requiring support from the service provider.
Restarting or updating the device would not resolve an account-level problem. This aligns with mobile troubleshooting practices that distinguish between device issues and carrier-related service configurations.
Question
A user reports that a newly installed mobile application requests excessive permissions, including access to contacts and location data, even though the application’s function does not require such access. The user is concerned about privacy and potential data misuse. What is the best course of action?
A. Deny unnecessary permissions and evaluate whether the app functions properly
B. Grant all requested permissions because modern apps require broad access
C. Uninstall the application and report it as malicious without further testing
D. Reset the device to factory settings to remove potential security threats
Correct Answer: A
Explanation:
Mobile applications should only be granted permissions that are necessary for their intended functionality. Denying unnecessary permissions allows the user to maintain privacy while testing whether the application operates correctly with limited access. If the app functions without additional permissions, the user can continue using it safely.
This troubleshooting approach emphasizes security and least-privilege principles, which are essential in mobile device management and software support.
Question
A user experiences intermittent mobile data connectivity even though the signal indicator shows strong reception. Web pages fail to load at times, but connectivity returns after switching airplane mode on and off. Other users in the same area report normal service. What is the most likely issue?
A. The device’s network stack is temporarily stuck and resetting the connection resolves it
B. The mobile carrier requires a different data plan for stable connectivity
C. The device antenna is damaged and must be replaced
D. Background applications are consuming all available bandwidth
Correct Answer: A
Explanation:
Intermittent connectivity that resolves after toggling airplane mode often indicates a temporary network stack issue on the device. Enabling and disabling airplane mode forces the device to reestablish network connections and clear minor communication errors. Since other users in the area experience normal service, the problem is unlikely to be carrier-related or hardware-based.
This troubleshooting step addresses software-level connectivity issues before considering more complex solutions.
Question
A company deploys a new security patch across multiple workstations. After deployment, several users report application errors that were not present before the update. You are tasked with documenting the incident and ensuring future deployments avoid similar issues. The operations team requests a record of the change, rollback steps taken, and root cause analysis. Which best practice should you follow to maintain proper system documentation and operational procedures compliance?
A. Document only the successful deployment details and omit errors to keep records concise
B. Record the change, issue description, remediation steps, and lessons learned in the change log
C. Maintain documentation but restrict access to the records to IT leadership only
D. Create separate documentation for security updates and application issues without linking them
Correct Answer: B
Explanation:
Proper documentation in operational procedures requires recording all relevant details of system changes, including issues encountered and remediation steps. This ensures future troubleshooting and compliance with change management policies. Documenting lessons learned improves organizational knowledge and reduces the likelihood of repeated errors.
Clear records also support audits and operational transparency. Best practices emphasize completeness and accuracy in documentation so that stakeholders can understand the full impact of changes and corrective actions.
Question
A technician modifies group policy settings to enforce password complexity requirements across the organization. After implementation, users experience login issues and report that their existing passwords no longer meet requirements. Management requests documentation of the policy change and a summary of user impact. What documentation practice ensures proper operational records and accountability?
A. Log only the final policy configuration and omit user impact details
B. Document policy changes, user feedback, and resolution steps in the change record
C. Store documentation locally on the technician’s workstation for convenience
D. Create a separate report for user issues without linking it to the policy change
Correct Answer: B
Explanation:
Operational documentation must include policy changes, user impact, and resolution steps to provide a complete record of system modifications. This practice supports accountability and helps teams understand the consequences of configuration updates.
Including user feedback and remediation details aids future decision-making and troubleshooting. Proper documentation aligns with best practices for change management and ensures transparency in operational procedures.
Question
A help desk technician resolves a recurring issue by resetting user profiles on several workstations. The resolution works, but there is no record of the changes made. Later, another technician encounters similar issues but lacks documentation of previous fixes. Which documentation practice should have been followed to improve operational efficiency?
A. Document only unresolved issues to reduce record clutter
B. Record all changes, resolutions, and affected systems in the service log
C. Maintain documentation but limit it to high-priority incidents
D. Store documentation in personal notes rather than shared systems
Correct Answer: B
Explanation:
Recording all changes and resolutions in the service log ensures that operational knowledge is preserved and accessible to other technicians. This practice improves efficiency by allowing teams to reference previous solutions and avoid redundant troubleshooting.
Shared documentation supports consistency and collaboration across the organization. Proper recordkeeping is essential for operational procedures and long-term system management.
Question
A company implements a new ticketing system for tracking IT incidents and resolutions. Technicians must document each incident with details about the problem, steps taken, and final resolution. Some technicians only record minimal information to save time. How does this impact operational procedures and documentation best practices?
A. Minimal documentation improves efficiency and reduces administrative overhead
B. Incomplete records hinder troubleshooting and knowledge sharing
C. Documentation is optional if the issue is resolved
D. Incident tracking systems are only required for security-related events
Correct Answer: B
Explanation:
Incomplete documentation undermines operational procedures by limiting the availability of historical data and troubleshooting insights. Proper records enable teams to analyze trends and apply lessons learned to future incidents.
Detailed documentation supports accountability and operational continuity. Best practices emphasize comprehensive records to improve system reliability and team collaboration.
Question
During a system audit, it is discovered that change records for several software updates are missing. The updates were applied successfully, but there is no documentation of approvals or rollback plans. What operational procedure best addresses this issue moving forward?
A. Continue updates without documentation if systems function correctly
B. Implement a change management process that requires documentation and approvals
C. Document changes only after audits identify missing records
D. Store change records locally instead of in a centralized repository
Correct Answer: B
Explanation:
Why implementing a change management process that requires documentation and approvals is the accurate answer of this CompTIA A+ practice test question? Let’s find out. A structured change management process ensures that all updates are documented and approved before implementation. This reduces operational risk and provides accountability for system modifications. Proper documentation includes change details, approvals, and rollback procedures. Centralized records support audits and operational transparency, aligning with best practices for system management.
What’s Next?
Get Your ComPTIA A+ PDF Questions Now
